Hardware  >   Communications Hardware  >   Voice Communications Hardware  >   Consumer Telephony Equipment  >   Telephones  >   Wireless Telephones  >  

Smartphones

RSS Feed    Add to Google    Add to My Yahoo!
Smartphones Reports
 
Protecting DNS Infrastructure: An Internet Utility That Demands New Security Solutions
sponsored by Cloudmark
WHITE PAPER: This exclusive white paper details key factors about the DNS threat landscape and offers a look at different security risks and types of attacks hackers are using to disrupt the network today. Read on to learn more.
Posted: 13 Jan 2015 | Published: 13 Jan 2015

Cloudmark

Mobile Device Management 101: Why Leasing Beats Buying Every Time
sponsored by Sprint
WHITE PAPER: This exclusive white paper takes an in-depth look at one strategy that not only gives employees the best devices for work, but can even save you thousands. Read on to learn more.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Sprint

Avoid the information governance traps of BYOD management
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this e-guide, learn the steps you must take to achieve a solid governance and mobile device management strategy to help your organization avoid these information governance traps. Read on to learn more.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Dell, Inc. and Intel®

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 01 Feb 2015 | Published: 14 Jan 2014

Hewlett-Packard Company

Location-Based Services: Enhance the Customer Experience
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at location-based services (LBS) that promise a budding customer-centric mobility solution in early adopters. Read on to learn more.
Posted: 03 Nov 2014 | Published: 03 Nov 2014

Cisco Systems, Inc.

Behind every good mobile device security policy is an educated staff
sponsored by Unisys
EGUIDE: In this expert e-guide, discover the importance of an effective mobile device security policy and why employers need to educate their workers on mobile security. Find out tips on educating employees and how to get started training your workers today.
Posted: 26 Feb 2015 | Published: 26 Feb 2015


Embracing Secure BYOD. What you need to know
sponsored by Acronis
WHITE PAPER: This white paper highlights the challenges that come with the BYOD trend. It also describes a solution that delivers a secure approach to BYOD without sacrificing end-user experience.
Posted: 22 Jul 2014 | Published: 31 Jan 2014

Acronis

Mobility’s Potential for Productivity and Pitfalls
sponsored by CA Technologies.
RESOURCE: In this resource, CA Technologies product marketing leader Arun Bhattacharya discusses the challenges of bringing mobility into the enterprise and how to overcome these obstacles successfully.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

CA Technologies.

Supporting Clinical Mobility: Key tips
sponsored by PC Connection
EGUIDE: Understanding physician workflow is key to choosing what mobile systems they need, such as tablet EHRs. This expert E-Guide highlights how physician mobility is transforming clinical workflow and reducing medical errors. Additionally, uncover how the right BYOD strategy can support mHealth.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

PC Connection

Juggling Management and Benefits of BYOD in the Enterprise
sponsored by SearchConsumerization.com
EBOOK: This handbook explores those positive aspects of devices in the enterprise and presents the challenges of managing more endpoints, facing security risks and enforcing usage policies.
Posted: 05 Jun 2014 | Published: 09 Jun 2014

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement